0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Kismet Hacking (Paperback): Frank Thornton, Michael J. Schearer, Brad Haines Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
R1,226 R1,128 Discovery Miles 11 280 Save R98 (8%) Ships in 12 - 17 working days

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Seven Deadliest Wireless Technologies Attacks (Paperback): Brad Haines Seven Deadliest Wireless Technologies Attacks (Paperback)
Brad Haines
R561 R434 Discovery Miles 4 340 Save R127 (23%) Ships in 12 - 17 working days

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Each chapter includes an example real attack scenario, an analysis of the attack, and methods for mitigating the attack. Common themes will emerge throughout the book, but each wireless technology has its own unique quirks that make it useful to attackers in different ways, making understanding all of them important to overall security as rarely is just one wireless technology in use at a home or office. The book contains seven chapters that cover the following: infrastructure attacks, client attacks, Bluetooth attacks, RFID attacks; and attacks on analog wireless devices, cell phones, PDAs, and other hybrid devices. A chapter deals with the problem of bad encryption. It demonstrates how something that was supposed to protect communications can end up providing less security than advertised. This book is intended for information security professionals of all levels, as well as wireless device developers and recreational hackers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Asus Chromebook FLIP CR1100FKA-C864G1C…
R8,599 Discovery Miles 85 990
Pokémon Encyclopedia Updated and…
Pokémon Hardcover R470 R376 Discovery Miles 3 760
Marco 2-Person Wicker Picnic Basket
R1,599 R1,239 Discovery Miles 12 390
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
The Handmaid's Tale - Season 4
Elisabeth Moss, Yvonne Strahovski, … DVD R416 Discovery Miles 4 160
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Afritrail Clifton Beach Shade
R800 R699 Discovery Miles 6 990
Aerolatte Cappuccino Art Stencils (Set…
R110 R95 Discovery Miles 950
Trade Professional Drill Kit Cordless…
 (9)
R2,223 Discovery Miles 22 230
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010

 

Partners